CVE-2021-20233

Severity
8.2HIGH
EPSS
0.2%
top 61.30%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 3
Latest updateMay 24

Description

A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters, while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.5 | Impact: 6.0

Affected Packages4 packages

NVDgnu/grub2< 2.06
Debiangrub2< 2.04-16+3
CVEListV5grub2grub 2.06

Also affects: Fedora 33, 34, Enterprise Linux 7.0, 8.0, 7.2, 7.3, 7.4, 7.6, 7.7, 8.2, 8.1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-257g-8w4g-3cc3: A flaw was found in grub2 in versions prior to 22022-05-24
OSV
CVE-2021-20233: A flaw was found in grub2 in versions prior to 22021-03-03
CVEList
CVE-2021-20233: A flaw was found in grub2 in versions prior to 22021-03-03

📋Vendor Advisories

5
Ubuntu
GRUB 2 vulnerabilities2021-06-18
Microsoft
A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 c2021-03-09
Red Hat
grub2: Heap out-of-bounds write due to miscalculation of space required for quoting2021-03-02
Red Hat
grub2: heap out-of-bound write due to mis-calculation of space required for quoting2021-03-02
Debian
CVE-2021-20233: grub2 - A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the me...2021